- Product: Splunk Enterprise or Splunk Cloud
- Feature: Search
- Function: Web server monitoring
To optimize the search shown below, you should specify an index. In addition, this sample search uses Websense proxy data. You can replace this source with any other proxy data used in your organization.
Data exfiltration usually occurs over standard channels in most organizations because users upload data to Google, Dropbox, Box, smaller file sharing sites, or unlisted drop sites. Since HTTPS is always allowed out, exfiltration becomes easy. You want to protect your organization by finding large file uploads that could point to data exfiltration in your network.
For more great content from the Splunk Education and Training team, check out Splunk How-To on YouTube or sign up for a course. In addition, these Splunk resources might help you understand and implement this search: